Introduction IT Audit & Assessment
                  20 Sept 2011

          OWASP Day Malaysia 2011

https://www.owasp.org/index.php/OWASP_Day_KL_2011
Agenda
●   Objective of The Day
●   Identified The Risks
●   Who should be involved
●   Where To Starts
●   What To Audit
●   When To Audit
●   How To Do It
Objective
•   Harden Our Servers
       •   In Depth Defense

•   Find the loophole
       •   Find the zero day
Risk


Only one risk – Human

To Err Is Human
Its our job to find it. :-)
Risks
●   Not a latest Patches
●   Forget my password
●   Allow all, Deny None
●   Install everything
●   Share anything
●   Phishing
●   No backup
Not The Latest Patches
●   Be alert
        –   http://www.mycert.org.my/en/
        –   http://www.securityfocus.com/
        –   http://packetstormsecurity.org/
        –   http://gcert.mampu.gov.my/
        –   http://www.cert.org/certcc.html
            Internet Storm Center
        –   http://isc.sans.edu/
            Patches Priority One
        –   http://www.sans.org/top-cyber-security-risks/
Lab One
●   Subscribe websites to Google Reader


●   http://www.kb.cert.org/vuls/
Forget My Password
●   We will use easy password
●   Password must = Senang nak ingat, susah nak
    teka.

●   Don't leak the hash
●   Generate MD5 hash
       –   http://md5crack.com/crackmd5.php
●   Crack MD5
       –   http://isc.sans.edu/tools/reversehash.html
Lab Two
●   Crack this
       –   password
       –   abc123
       –   haris
       –   Your own name
       –   Birthday date in numbers
       –   Birthday date in any format
Allow All Deny None
●   Any ports outbound open
●   Not proxy between LAN and Internet
●   Used by BOT to attack and comm with BOSS
Lab Three
●   Telnet
        –   Telnet in CMD and Shell
        –   Port 80 GET /index.htm HTTP/1.1 and enter
             twice
        –   Port 25 helo and quit


●   Visit this website
        –   http://www.yougetsignal.com/tools/open-ports/
        –   http://canyouseeme.org/
Install Everything
●   To many patches
●   To many services
●   Only select what you want
Share Everything
●   Windows Share permission “every body”
        –   Don't trust your network
●   Putting files in web servers
        –   Google BOT nyum-nyum
Lab Four
●   Google own name in PDF files
       –   harisfazillah filetype:pdf
●   You own IC numbers (with and without -)
       –   Do this on your own
Phishing
●   The most used tactic to gain password
       –   Email
       –   Phone
Lab Five
●   Track your organisation here
        –   http://www.phishtank.com/
●   You will never know, you are the target.
●   Defacement Archive
        –   http://www.zone-h.org/archive
Break



Jom Minum
Who

             ?
     - The Management
            - ICT
            - Me

Everybody need to be involved
Lab Six
●   CIS Security – The Benchmark
       –   http://www.cisecurity.org/
Where To Start
●   Any servers that have IP address
       –   Public or Internal
       –   Heavy traffic websites and Email

●   LAN
       –   Review firewall and proxy log
       –   SMTP activities
       –   IRC bot activities
       –   HTTP and HTTPS requests
       –   Minitor network traffic
Lab Seven
●   Get the bootable CD
●   tcpdump
●   wireshark
●   Any network analysis tools
When To Do It
●   A must every 6 months
●   Any security warning
Contact
    linuxmalaysia@gmail.com


http://green-osstools.blogspot.com/

More Related Content

PDF
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
PPTX
Hacking - Breaking Into It
PPTX
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
PDF
MonkeySpider at Sicherheit 2008
PDF
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...
PDF
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
PDF
ProjectTox: Free as in freedom Skype replacement
PDF
An EyeWitness View into your Network
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
Hacking - Breaking Into It
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
MonkeySpider at Sicherheit 2008
Puppet Camp Boston 2014: Securely Managing Secrets with FreeIPA and Puppet (I...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
ProjectTox: Free as in freedom Skype replacement
An EyeWitness View into your Network

What's hot (16)

PDF
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
PPTX
Pen Testing, Red Teaming, and More
PDF
Git hooks For PHP Developers
PDF
Bypassing Web Application Firewalls and other security filters
PPTX
Same-origin Policy (SOP)
PDF
Ever Present Persistence - Established Footholds Seen in the Wild
PDF
Web Exploitation
PDF
The State of the Veil Framework
PDF
CheckPlease: Payload-Agnostic Targeted Malware
PDF
Bo0oM - There's Nothing so Permanent as Temporary (PHDays IV, 2014)
PDF
PDF
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
PDF
Fuzzing - Part 2
PDF
Make CSRF Again
PDF
Bringing Down the House - How One Python Script Ruled Over AntiVirus
PPTX
PHP: apresentando a linguagem, suas tecnologias e a comunidade
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Pen Testing, Red Teaming, and More
Git hooks For PHP Developers
Bypassing Web Application Firewalls and other security filters
Same-origin Policy (SOP)
Ever Present Persistence - Established Footholds Seen in the Wild
Web Exploitation
The State of the Veil Framework
CheckPlease: Payload-Agnostic Targeted Malware
Bo0oM - There's Nothing so Permanent as Temporary (PHDays IV, 2014)
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
Fuzzing - Part 2
Make CSRF Again
Bringing Down the House - How One Python Script Ruled Over AntiVirus
PHP: apresentando a linguagem, suas tecnologias e a comunidade
Ad

Viewers also liked (6)

PPSX
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
PDF
Ritva Inkinen: Turvallinen lääkehoito -opas
 
PPT
Ceramah Audit Prestasi
PPTX
ICT Auditing
PPTX
Bukti Audit, Tujuan Audit, Program Audit
PPT
Network Security
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
Ritva Inkinen: Turvallinen lääkehoito -opas
 
Ceramah Audit Prestasi
ICT Auditing
Bukti Audit, Tujuan Audit, Program Audit
Network Security
Ad

Similar to Introduction To ICT Security Audit OWASP Day Malaysia 2011 (20)

PDF
Invited Talk - Cyber Security and Open Source
KEY
Unity makes strength
PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
PDF
Real life hacking101
PDF
Penetration Testing is the Art of the Manipulation
PDF
20120329 Cybercrime threats on e-world
PPTX
Security_Awareness_Primer.pptx
PDF
Web security 101
PDF
PPTX
Cyber Security Awareness Program.pptx
PPTX
Cyber crime &_info_security
PDF
Ultimate pen test compromising a highly secure environment (nikhil)
PDF
Do You Write Secure Code? by Erez Metula
PPTX
Why do women love chasing down bad guys?
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PPTX
Hacker tooltalk: Social Engineering Toolkit (SET)
PDF
Getting users to care about security
PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
USG_Security_Awareness_Primer (1).pptx
Invited Talk - Cyber Security and Open Source
Unity makes strength
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Real life hacking101
Penetration Testing is the Art of the Manipulation
20120329 Cybercrime threats on e-world
Security_Awareness_Primer.pptx
Web security 101
Cyber Security Awareness Program.pptx
Cyber crime &_info_security
Ultimate pen test compromising a highly secure environment (nikhil)
Do You Write Secure Code? by Erez Metula
Why do women love chasing down bad guys?
The Top 10/20 Internet Security Vulnerabilities – A Primer
Hacker tooltalk: Social Engineering Toolkit (SET)
Getting users to care about security
Awareness Security 123.pptx
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer (1).pptx

More from Linuxmalaysia Malaysia (20)

PDF
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
PDF
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
PDF
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
PDF
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
PDF
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
PDF
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
PDF
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
PDF
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
PDF
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
PDF
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
PDF
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
PDF
OSDC.my Master Plan For Malaysia Open Source Community
PDF
33853955 bikesh-beginning-smart-phone-web-development
PDF
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
PDF
DNS solution trumps cloud computing competition
PDF
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
PDF
Benchmarking On Web Server For Budget 2008 Day
PDF
Sesuaikan Masa Sempena 2010
ODT
OSS Community In Malaysia 2009 List
PDF
List Of OSS Communities Malaysia 2009
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
OSDC.my Master Plan For Malaysia Open Source Community
33853955 bikesh-beginning-smart-phone-web-development
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
DNS solution trumps cloud computing competition
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Benchmarking On Web Server For Budget 2008 Day
Sesuaikan Masa Sempena 2010
OSS Community In Malaysia 2009 List
List Of OSS Communities Malaysia 2009

Introduction To ICT Security Audit OWASP Day Malaysia 2011

  • 1. Introduction IT Audit & Assessment 20 Sept 2011 OWASP Day Malaysia 2011 https://www.owasp.org/index.php/OWASP_Day_KL_2011
  • 2. Agenda ● Objective of The Day ● Identified The Risks ● Who should be involved ● Where To Starts ● What To Audit ● When To Audit ● How To Do It
  • 3. Objective • Harden Our Servers • In Depth Defense • Find the loophole • Find the zero day
  • 4. Risk Only one risk – Human To Err Is Human
  • 5. Its our job to find it. :-)
  • 6. Risks ● Not a latest Patches ● Forget my password ● Allow all, Deny None ● Install everything ● Share anything ● Phishing ● No backup
  • 7. Not The Latest Patches ● Be alert – http://www.mycert.org.my/en/ – http://www.securityfocus.com/ – http://packetstormsecurity.org/ – http://gcert.mampu.gov.my/ – http://www.cert.org/certcc.html Internet Storm Center – http://isc.sans.edu/ Patches Priority One – http://www.sans.org/top-cyber-security-risks/
  • 8. Lab One ● Subscribe websites to Google Reader ● http://www.kb.cert.org/vuls/
  • 9. Forget My Password ● We will use easy password ● Password must = Senang nak ingat, susah nak teka. ● Don't leak the hash ● Generate MD5 hash – http://md5crack.com/crackmd5.php ● Crack MD5 – http://isc.sans.edu/tools/reversehash.html
  • 10. Lab Two ● Crack this – password – abc123 – haris – Your own name – Birthday date in numbers – Birthday date in any format
  • 11. Allow All Deny None ● Any ports outbound open ● Not proxy between LAN and Internet ● Used by BOT to attack and comm with BOSS
  • 12. Lab Three ● Telnet – Telnet in CMD and Shell – Port 80 GET /index.htm HTTP/1.1 and enter twice – Port 25 helo and quit ● Visit this website – http://www.yougetsignal.com/tools/open-ports/ – http://canyouseeme.org/
  • 13. Install Everything ● To many patches ● To many services ● Only select what you want
  • 14. Share Everything ● Windows Share permission “every body” – Don't trust your network ● Putting files in web servers – Google BOT nyum-nyum
  • 15. Lab Four ● Google own name in PDF files – harisfazillah filetype:pdf ● You own IC numbers (with and without -) – Do this on your own
  • 16. Phishing ● The most used tactic to gain password – Email – Phone
  • 17. Lab Five ● Track your organisation here – http://www.phishtank.com/ ● You will never know, you are the target. ● Defacement Archive – http://www.zone-h.org/archive
  • 19. Who ? - The Management - ICT - Me Everybody need to be involved
  • 20. Lab Six ● CIS Security – The Benchmark – http://www.cisecurity.org/
  • 21. Where To Start ● Any servers that have IP address – Public or Internal – Heavy traffic websites and Email ● LAN – Review firewall and proxy log – SMTP activities – IRC bot activities – HTTP and HTTPS requests – Minitor network traffic
  • 22. Lab Seven ● Get the bootable CD ● tcpdump ● wireshark ● Any network analysis tools
  • 23. When To Do It ● A must every 6 months ● Any security warning
  • 24. Contact [email protected] http://green-osstools.blogspot.com/